To streamline team promotions,

please get in touch with us.

Table of Contents

Human-Centric CyberSecurity

Our online course is designed to provide in-depth learning experiences, and it spans a total duration of 30 hours, ensuring you gain a comprehensive understanding of the subject matter.


Welcome!

  • The Context
  • Table of Contents


Determine your level of knowledge

  • Before you begin, assess your current level of knowledge.
  • First Step: Determine your current level of knowledge.


Introduction: Human-centered cybersecurity - People as Potential Defenders and Threats

  • Why Human-Centric Cybersecurity?
  • Q0 Test your learning about Human-Centric Cybersecurity


Section 1 - Human errors in cybersecurity and their effects

  • S1 - A1 Consequences of cybersecurity human errors
  • S1 - Q1 Test your learning - Consequences of cybersecurity human errors
  • S1 - A2 Preventing and Mitigating Cybersecurity Human Errors
  • S1 - Q2 Test your learning - Preventing and Mitigating Cybersecurity Human Errors


Section 2 - Cybersecurity Privilege Abuse's Effects

  • S2 - A1 Consequences of Cybersecurity Privilege Abuse
  • S2 - Q1 Test your learning - Consequences of Cybersecurity Privilege Abuse
  • S2 - A2 Preventing and Mitigating Privilege Abuse
  • S2 - Q2 Test your learning - Preventing and Mitigating Privilege Abuse


Section 3 - Cybersecurity Repercussions of Stolen Credentials

  • S3 - A1 Consequences of Stolen Credentials in Cybersecurity
  • S3 - Q1 Test your learning - Consequences of Stolen Credentials in Cybersecurity
  • S3 - A2 Preventing and Mitigating Stolen Credentials in Cybersecurity:
  • S3 - Q2 Test your knowledge - Preventing and Mitigating Stolen Credentials in Cybersecurity


Section 4 - Impacts of Social Engineering in Cybersecurity

  • S4 - A1 Consequences of Cybersecurity Social Engineering
  • S4 - Q1 Test your learning - Consequences of Cybersecurity Social Engineering
  • S4 - A2 Preventing and Mitigating Social Engineering Attacks
  • S4 - Q2 Test your knowledge - Preventing and Mitigating Social Engineering Attacks


Section 5 - Business Email Compromise (BEC) attack for commercial fraud.

  • S5 - A1 Consequences of Business Email Compromise (BEC)
  • S5 - Q1 Test your learning - Business Email Compromise (BEC) attack for retail fraud.
  • S5 - A2 Preventing and Mitigating of Business Email Compromise (BEC)
  • S5 - Q2 Test your learning - Preventing and Mitigating of Business Email Compromise (BEC)


Section 6 - Cognitive Biases and Their Impact on Cybersecurity

  • S6 - A1 Consequences of Cognitive Biases and Their Impact on Cybersecurity

Trends and Conclusion in Human-Centered Cybersecurity

  • CA1Trends in Human-Centered Cybersecurity
  • CQ1 Test your knowledge - Trends in Human-Centered Cybersecurity
  • CA2 Conclusions
  • CQ2 Test your knowledge - Conclusions


Determine your level of knowledge

  • To conclude, assess your current level of knowledge
  • Last step: Determine your current level of knowledge


Before you go...

  • Drag handle to reorder lessoS1 Improving iSecure (NPS)
  • Drag handle to reorder lessS2 Safety at work - On a scale of 0 to 10 (0 = Not at all likely, 10 = Extremely likely)